Reputational consequences of victim signaling: Victimhood decreases status
🔒Cyber security
Flag this post
The Curse of Dimensionality and GIS
🤖AI
Flag this post
AiDHD: Reflecting on 6 Months Vibing
🤖AI
Flag this post
Thoughts on Building Reliable Systems
🤖AI
Flag this post
A Security Model for Systemd
🔒Cyber security
Flag this post
Microsoft creates a team to make ‘humanist superintelligence’
computerworld.com·1d
🤖AI
Flag this post
TDS Newsletter: The Theory and Practice of Using AI Effectively
towardsdatascience.com·1d
🤖AI
Flag this post
Going From Reactive to Predictive Incident Response with AIOps
hackernoon.com·3d
🔒Cyber security
Flag this post
Proto-LeakNet: Towards Signal-Leak Aware Attribution in Synthetic Human Face Imagery
arxiv.org·1d
🤖AI
Flag this post
DevSecOps in Practice: Closing the Gap Between Development Speed and Security Assurance
devops.com·1d
🔒Cyber security
Flag this post
AI Ruined Programming, So I Fixed It (2025)
🤖AI
Flag this post
PETRA: Pretrained Evolutionary Transformer for SARS-CoV-2 Mutation Prediction
arxiv.org·1d
🤖AI
Flag this post
Loading...Loading more...